• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 441
  • 378
  • 167
  • 91
  • 88
  • 67
  • 32
  • 22
  • 22
  • 17
  • 10
  • 7
  • 6
  • 5
  • 5
  • Tagged with
  • 1507
  • 211
  • 178
  • 174
  • 127
  • 116
  • 104
  • 89
  • 84
  • 78
  • 78
  • 74
  • 71
  • 68
  • 66
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Desired Features and Design Methodologies of Secure Authenticated Key Exchange Protocols in the Public-Key Infrastructure Setting

Wang, Hao-Hsien January 2004 (has links)
The importance of an authenticated key exchange (AKE) protocol has long been known in the field of cryptography. Two of the questions still being asked today are (1) what properties or features does a secure AKE protocol possess, and (2) How does one, in a step by step fashion, create a secure AKE protocol? This thesis aims to answer these two questions. The thesis contains two parts: one is a survey of previous works on the desired features of the Station-to-Station (STS) protocol, and the other is a study of a previously proposed design methodology in designing secure AKE protocols, as well as contributing an original idea of such methodologies. Descriptions and comparisons of the two design methodologies are included. The thesis surveys the literature and conducts a case study of the STS protocol, analyzes various attacks on STS through some known attacks to it, and extracts the desired properties and features of a secure AKE protocol via the case study. This part of the thesis does not propose any new result, but summarizes a complete list of issues one should take consideration of while designing an AKE protocol. We also show that at the end of this part, a secure version of STS which possesses the desired features of an AKE protocol. The other major part of the thesis surveys one design methodology of creating a secure AKE protocol by Bellare, Canetti, and Krawczyk; it is based on having a secure key exchange protocol then adding (mutual) authentication to it. The thesis then proposes another original design methodology; it starts with a secure mutual authentication protocol, then adds the secure key exchange feature without modifying overheads and number of flows of the original mutual authentication protocol. We show in this part the "secure" AKE protocol developed through these two design approaches is identical to the secure version of STS described in the other part, and thus possesses the desired features of a secure AKE protocol. We also give a proof of security of the secure AKE protocol developed under our design methodology.
82

Desired Features and Design Methodologies of Secure Authenticated Key Exchange Protocols in the Public-Key Infrastructure Setting

Wang, Hao-Hsien January 2004 (has links)
The importance of an authenticated key exchange (AKE) protocol has long been known in the field of cryptography. Two of the questions still being asked today are (1) what properties or features does a secure AKE protocol possess, and (2) How does one, in a step by step fashion, create a secure AKE protocol? This thesis aims to answer these two questions. The thesis contains two parts: one is a survey of previous works on the desired features of the Station-to-Station (STS) protocol, and the other is a study of a previously proposed design methodology in designing secure AKE protocols, as well as contributing an original idea of such methodologies. Descriptions and comparisons of the two design methodologies are included. The thesis surveys the literature and conducts a case study of the STS protocol, analyzes various attacks on STS through some known attacks to it, and extracts the desired properties and features of a secure AKE protocol via the case study. This part of the thesis does not propose any new result, but summarizes a complete list of issues one should take consideration of while designing an AKE protocol. We also show that at the end of this part, a secure version of STS which possesses the desired features of an AKE protocol. The other major part of the thesis surveys one design methodology of creating a secure AKE protocol by Bellare, Canetti, and Krawczyk; it is based on having a secure key exchange protocol then adding (mutual) authentication to it. The thesis then proposes another original design methodology; it starts with a secure mutual authentication protocol, then adds the secure key exchange feature without modifying overheads and number of flows of the original mutual authentication protocol. We show in this part the "secure" AKE protocol developed through these two design approaches is identical to the secure version of STS described in the other part, and thus possesses the desired features of a secure AKE protocol. We also give a proof of security of the secure AKE protocol developed under our design methodology.
83

Optimal Relay Station Placement in Broadband Wireless Access Networks

Vasishta, Anuj January 2012 (has links)
With the development of IEEE 802.16j multihop relay protocol, the requirement to enhance the network capacity in a wireless network has been met e ectively. In this thesis, we study the capacity enhancement problem for a broadband wireless access network which is achieved by optimal placement of Relay Stations (RSs) along with the presence of a Base Station (BS) and multiple Candidate Positions (CPs). We present a mixed integer programming formulation for the crucial task of RS placement. Weighted objective is also explored to include preferential RS placement. The proposed formulations are solved in a matter of seconds. It is observed that with preferential RS placement, the same demand can be met with 73% fewer RSs with a slight, 6%, decrease in the overall network capacity. Moving forward, the objective is broadened to combine and include joint BS and RS placements for a given network. This model formulation provides better overall capacity than combined capacities of RS placement formulations. Maximin objective is introduced to distribute the excess bandwidth to all subscriber stations (SS) rather than assigning it to only one SS. With this approach, bandwidth allocated to each SS is increases by an average of 35.18%.
84

A Study of the Process Model for Mobile Base Station Dispute.

Chuang, Tung-feng 08 July 2004 (has links)
In the early 90s¡¦, the government of the Republic of China, Taiwan (ROC) declared the end of martial law. Taiwanese society has moved toward multi-dimensional development, which includes the greater liberal awareness of the public, as well as gradually forming various but unique social cultures. Among these cultural changes is the right to public dispute. In the past two decades, several public disputes have occurred; from the dispute against environmental pollution by the petrochemical industry, including the Chinese Petroleum Corporation, followed by the establishment of a Du Pont chemical factory, the rejection of garbage disposal plant & incinerator building, the anti-construction of nuclear power plants & the Mei Nong reservoir. To attract more customers and to pre¡Vdominate the potential market, competitors in the telecommunication industry have implemented strategies to build excess mobile base station to enhance the quality of the signal reception. From recent scientific research, there is no clear evidence to prove that electromagnetic wave signals from mobile telecommunications have any direct impact on human health. In the Year 2000, the Executive Environmental Department in Taiwan has officially announced that electromagnetic wave signals from mobile telecommunications were not a source of pollutants. However, the objection of anti-establishing mobile base station has gradually become one of the leading issues of public dispute. The dispute approaches have tended to be radical and irrational, which has lead to strong violence. In the mean time, the government and the telecommunication industry are not able to respond to and resolve the current situation. These issues not only threaten the ability for the mobile telecommunication industry to survive, but cost an incredible amount of the social resource which it is also a great concern for the similar conditions in future society. The research motivations were developed by considering the special cultural backgrounds mentioned above. The literature review includes the following research areas: conflict management; the crises interventional communication; negotiating skills; legislation process study; and the theory of outsourcing study. Furthermore, surveys on professional groups were completed to seek expertise and feedback to help resolve public radical situations. Interviews were also conducted on some key radical and irrational people to increase the public awareness about the severity of disputes. In this study, the author also investigates reasons behind public disputes and what the public has experienced and learned. To summarize, the findings of this study: 1. In the current stage, the managerial approach only resolves a radical situation as it happens; a long term and systematic methodology is still unavailable and yet to be developed. Even though the short term resolution allows authorities to accumulate precious experiences in managing public pressure, the current methodology can not effectively prevent and avoid public disputes occurrence. 2. The fundamental idea from authorities is still in favor of ¡§technical educations¡¨ which permits technicians to take major responsibilities in implementing the idea of ¡§technical skill demonstrations¡¨ to communicate and lead the agenda. However, the outcomes do not appear to be effective to those irrational and radical disputes. 3. Political power interventions mean the government is unable to provide a stable environment for industrial developments. There are politicians¡¦ interventions from different parties; public threatens and violence might also be the reasons that cause immobilized feedbacks from the government. Based on the investigation on the pros and cons of disputes on excess mobile base station and possible dispute modes, long term and short term solutions were developed. The solutions include: 1. Possible long term solutions: (1) Develop long term strategic plans, which enable the prevention of future dispute. The practical plans include media operations, professional propaganda planning, management for united industrial unions on public disputes and offers of technical and general product propagandas to the public. (2) Organizational structure justifications, traditional conceptual changes in public disputes and formations of special negotiation teams: the authority should initiate with its negotiation process based on public opinions rather than listed contents with technical issues. Professional teams should have the ability to implement the law, the public relationship and technology to the public. (3) A liberal and a specific budget support for individual projects. (4) Mobile base station embellishments and joint venture with the industrial union. (5) Provide outsourcing to professionalism. (6) Seeking for political assistances: Through democratic operations, the government should maximize its ability in public authority monitoring and the law execution. This also ensures and protects legal welfares for the mobile telecommunication industry. 2. Possible short term solutions: (1) General strategies in station selection issues. (2) New tactics formations. (3) Training professional negotiators. (4) Holding regular conferences, exchanging ideas which draw upon useful opinions, and editing ¡§Irrational mobile base station dispute management¡¨ reference handbook. (5) Educate the public to understand and obey the law. Using the law to protect and maintain basic rights for the mobile telecommunication industry. The final discussions conclude with some proposed solutions to manage public disputes. The future research recommendations to the mobile telecommunication industry, the professional team, and the governmental organizations are also included. The aim is to establish a rational and peaceful future society and provide a stable business environment for the mobile telecommunication industry.
85

Design of an underground compressed hydrogen gas storage

Powell, Tobin Micah 14 February 2011 (has links)
Hydrogen has received significant attention throughout the past decade as the United States focuses on diversifying its energy portfolio to include sources of energy beyond fossil fuels. In a hydrogen economy, the most common use for hydrogen is in fuel cell vehicles. Advancements in on-board storage devices, investment in hydrogen production facilities nation-wide, development of a hydrogen transmission infrastructure, and construction of hydrogen fueling stations are essential to a hydrogen economy. This research proposes a novel underground storage technique to be implemented at a hydrogen fueling station. Three boreholes are drilled into the subsurface, with each borehole consisting of an outer pipe and an inner pipe. Hydrogen gas (H2) is stored in the inner tube, while the outer pipe serves to protect the inner pipe and contain any leaked gas. Three boreholes of varying pressures are necessary to maintain adequate inventory and sufficient pressure while filling vehicles to full tank capacity. The estimated cost for this storage system is $2.58 million. This dollar amount includes drilling and completion costs, steel pipe costs, the cost of a heavy-duty hydrogen compressor, and miscellaneous equipment expenses. Although the proposed design makes use of decades’ worth of experience and technical expertise from the oil and gas industry, there are several challenges—technical, economic, and social—to implementing this storage system. The impact of hydrogen embrittlement and the lack of a hydrogen transmission infrastructure represent the main technical impediments. Borehole H2 storage, as part of a larger hydrogen economy, reveals significant expenses beyond those calculated in the amount above. Costs related to delivering H2 to the filling station, electricity, miscellaneous equipment, and maintenance associated with hydrogen systems must also be considered. Public demand for hydrogen is low for several reasons, and significant misperceptions exist concerning the safety of hydrogen storage. Although the overall life-cycle emissions assessment of hydrogen fuel reveals mediocre results, a hydrogen economy impacts air quality less than current fossil-fuel systems. If and when the U.S. transitions to a hydrogen economy, the borehole storage system described herein is a feasible solution for on-site compressed H2 storage. / text
86

Material Flow and Stakeholder Analysis for a Transfer & Recycling Station in Gaborone, Botswana

Andersson, Emil January 2014 (has links)
Landfilling waste material is still one of the most common methods to take care of waste in a big part of the world. Gaborone, the capital of Botswana located in the southern part of Africa is no different in this way. The major part of all waste is landfilled in Gaborone and there is only a minor part of all collected material that is recycled. One solution that earlier studies suggest is to build a transfer and recycling station in the city of Gaborone that can contribute to a more sustainable waste management. This study aims to identify the major waste streams of recyclable waste and also the major stakeholders that are active in this area through an exploratory study involving interviews, a workshop and a survey. The result of this thesis can hopefully assist in the preparations for such a transfer station. The conclusions of this study are many and contains of both hard facts and also loose ends that can contribute to pursue further studies. The first important result is that all the waste collection companies transports everything they collects to a landfill and it is only recycling organizations that are working with collection and recycling in Gaborone. These recycling organizations are a few but smaller compared to the waste collection companies in collected amounts of material. Besides these collection organizations, Gaborone City Council, the local municipality works with collection of household waste and the collaboration between these three groups that operates in the same environment is very poor. All the interviewed stakeholders showed a positive interest in the transfer and recycling station but there is only a small part of the commercial business in Gaborone that believes in a more serious waste management than landfilling. Despite that one major shopping mall actually sort out recyclables and saves 30% in waste management costs thanks to that. Another issue is the prevailing cultural contradictions that is obvious among the organizations in Gaborone. The last two bigger issues is the tremendously dull political bureaucracy that is appearing in Botswana and also that voices are raised that corruption is great beneath the surface.
87

Optimal Relay Station Placement in Broadband Wireless Access Networks

Vasishta, Anuj January 2012 (has links)
With the development of IEEE 802.16j multihop relay protocol, the requirement to enhance the network capacity in a wireless network has been met e ectively. In this thesis, we study the capacity enhancement problem for a broadband wireless access network which is achieved by optimal placement of Relay Stations (RSs) along with the presence of a Base Station (BS) and multiple Candidate Positions (CPs). We present a mixed integer programming formulation for the crucial task of RS placement. Weighted objective is also explored to include preferential RS placement. The proposed formulations are solved in a matter of seconds. It is observed that with preferential RS placement, the same demand can be met with 73% fewer RSs with a slight, 6%, decrease in the overall network capacity. Moving forward, the objective is broadened to combine and include joint BS and RS placements for a given network. This model formulation provides better overall capacity than combined capacities of RS placement formulations. Maximin objective is introduced to distribute the excess bandwidth to all subscriber stations (SS) rather than assigning it to only one SS. With this approach, bandwidth allocated to each SS is increases by an average of 35.18%.
88

The Building Performance Of The Metro Station Buildings

Aksoy, Gokhan 01 January 2004 (has links) (PDF)
Station buildings are the most significant components of metro systems that combine underground facilities to the outer world, and include public life in itself. Thus, it is the main objective of that research, to put forward an acknowledgement documentation, which identifies the main design and construction problems of existing and under construction metro station buildings&trade / entrances, and which comes up with solutions to these problems. In the scope of thesis, foremost, basic terminology about station buildings are given and historical development of these buildings in abroad and Turkey are explained briefly. Then, observed problems of metro station entrances are put forward in detail. These problems are mainly categorized as design, construction, material and application related problems. Design part is investigated under following sub-titles: Psychological effects, lighting conditions, space requirements, relationship with city, navigation and disabled accessibility of stations. The affect of recent construction techniques and technological developments on design are also explained. Lastly, material choice and application related problems are investigated through such components of station as wall, floor, ceiling and details. All these problems are assessed by making comparisons with examples both from abroad and from Turkey. Finally, it is comprehended that, because of having weak connections to outer world, the entrances of the stations have adequate contributions neither to the station nor to the city. Assessment of building performance is made under the light of predefined problems and proposals are made in order to be used in design studies to get station entrances free from those problems.
89

College radio survivability emerging business models and the challenges of technological convergence /

Merrill, Stephen Austin. January 2008 (has links)
Thesis (M.A.)--Bowling Green State University, 2008. / Document formatted into pages; contains ix, 104 p. Includes bibliographical references.
90

Discovering God's vision and basic action plans for Thompson Station Baptist Church

McCoy, Thomas J. January 1994 (has links)
Thesis (D. Min.)--Mid-America Baptist Theological Seminary, 1994. / Includes bibliographical references (leaves 143-150).

Page generated in 0.0706 seconds